3: ASLan final version with dynamic service and policy composition, 2010. ,
A Critical Overview of the Web Services Choreography Description Language (WS-CDL). BPTrends, 2005. ,
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, 2009 22nd IEEE Computer Security Foundations Symposium, pp.124-140, 2009. ,
DOI : 10.1109/CSF.2009.26
A logic of communication in hostile environment, [1990] Proceedings. The Computer Security Foundations Workshop III, pp.14-22, 1990. ,
DOI : 10.1109/CSFW.1990.128181
Analyzing conversations of Web services, IEEE Internet Computing, vol.10, issue.1, pp.18-25, 2006. ,
DOI : 10.1109/MIC.2006.1
Structured communicationcentred programming for web services, Proceedings of the 16th European conference on Programming, ESOP'07, pp.2-17, 2007. ,
Generating formal cryptographic protocol specifications, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp.137-146, 1994. ,
DOI : 10.1109/RISP.1994.296586
Orchestration under Security Constraints, Sixth International Workshop on Formal Aspects in Security and Trust (FAST2009) Eindhoven, the Netherlands, 2009. ,
DOI : 10.1007/11805618_21
URL : https://hal.archives-ouvertes.fr/hal-00642855
Automatic Composition of Services with Security Policies, 2008 IEEE Congress on Services, Part I, pp.529-537, 2008. ,
DOI : 10.1109/SERVICES-1.2008.13
URL : https://hal.archives-ouvertes.fr/inria-00330338
Compiling and securing cryptographic protocols, Information Processing Letters, vol.110, issue.3, pp.116-122, 2010. ,
DOI : 10.1016/j.ipl.2009.11.004
URL : https://hal.archives-ouvertes.fr/inria-00527633
CAPSL integrated protocol environment, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.207-221, 2000. ,
DOI : 10.1109/DISCEX.2000.824980
Strand spaces: why is a security protocol correct? In Security and Privacy, Proceedings. 1998 IEEE Symposium on, pp.160-171, 1998. ,
Programming Cryptographic Protocols, Trust in Global Computing, pp.116-145, 2005. ,
DOI : 10.1007/11580850_8
Trusted Multiplexing of Cryptographic Protocols, Sixth International Workshop on Formal Aspects in Security and Trust (FAST2009) Eindhoven, the Netherlands, 2009. ,
DOI : 10.1007/978-3-642-12459-4_16
Cryptographic protocol generation from CAPSL, 2001. ,
Algebraic Properties in Alice and Bob Notation, 2009 International Conference on Availability, Reliability and Security, pp.433-440, 2009. ,
DOI : 10.1109/ARES.2009.95
The CL-Atse Protocol Analyser, Term Rewriting and Applications (Proceedings of RTA'06), pp.277-286, 2006. ,
DOI : 10.1007/11805618_21
URL : https://hal.archives-ouvertes.fr/inria-00103573
Web Services Choreography Description Language Version 1.0, 2005. ,